Home

Malicious Life

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comment

Episodes

Total: 263

APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT &a

Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal,

On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, e

The Fappening/Celebgate

2024/10/29

Could thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But f

Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents,

In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scien

On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accuse

SNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were re

Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down th

In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese fi

In the pre-internet era, encryption was a matter of life and death, and the motives behind these cip

Why did people write malware in the pre-internet days? Back then, there was no way to make money by

Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated deba

What Happened at Uber?

2024/6/11

In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CIS

The Nigerian Prince

2024/5/28

In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also

Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordina

A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in

The Y2K Bug, Part 2

2024/4/16

In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, on

The Y2K Bug, Part 1

2024/3/31

In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using a 2

Can You Bomb a Hacker?

2024/3/19

The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside